Personal information and organizational information need to be protected, which requires that only authorized users gain access to the information. The most commonly used method f...
Kim-Phuong L. Vu, Robert W. Proctor, Abhilasha Bha...
This doctoral research aims to persuade users to choose and remember more secure text passwords. The first component involved user studies demonstrating that users can be persuade...
User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...